Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Providing services using network-based humanoids in a home environment., , , , and . IEEE Trans. Consumer Electronics, 57 (4): 1628-1636 (2011)Network anomaly detection with incomplete audit data., and . Computer Networks, 51 (13): 3935-3955 (2007)A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks., , and . IEEE Trans. Parallel Distrib. Syst., 18 (5): 577-588 (2007)Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention., , , and . IEEE Network, 27 (3): 16-21 (2013)Control Channel Establishment in Cognitive Radio Networks using Channel Hopping., , and . IEEE Journal on Selected Areas in Communications, 29 (4): 689-703 (2011)Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks., , and . GLOBECOM, IEEE, (2006)A Knowledge-Based Service Approach for Human-Centered Robots., , , and . RO-MAN, page 582-587. IEEE, (2007)Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum., , and . INFOCOM, page 1566-1574. IEEE, (2012)Independent Joint Learning: A novel task-to-task transfer learning scheme for robot models., , and . ICRA, page 5679-5684. IEEE, (2014)A Control Architecture to Achieve Manipulation Task Goals for a Humanoid Robot., , , , and . ICRA, page 206-212. IEEE Computer Society, (1998)